Search results

122 items matching your search terms.
Filter the results.
Item type


































































New items since



Sort by relevance · date (newest first) · alphabetically
File text/x-sh Cloud Computing Risk Assessment - Spanish
Computación en nube, Beneficios, riesgos y reconendaciones para la seguridad de la Información
Located in Topics / / Files / Deliverables
Report/Study chemical/x-pdb Cloud Computing Risk Assessment
ENISA, supported by a group of subject matter expert comprising representatives from Industries, Academia and Governmental Organizations, has conducted, in the context of the Emerging and Future Risk Framework project, an risks assessment on cloud computing business model and technologies. The result is an in-depth and independent analysis that outlines some of the information security benefits and key security risks of cloud computing. The report provide also a set of practical recommendations.Produced by ENISA with contributions from a group of subject matter expert comprising representatives from Industry, Academia and Governmental Organizations, a risk assessment of cloud computing business model and technologies. This is an in-depth and independent analysis that outlines some of the information security benefits and key security risks of cloud computing. The report provide also a set of practical recommendations. It is produced in the context of the Emerging and Future Risk Framework project.
Located in Publications
Image PNG image Cloud video image
Located in Press & Media / News Items
CloudeAssurance
Located in Topics / / RM Inventory / RM/RA Tools
Cobra
Located in Topics / / RM Inventory / RM/RA Tools
File PDF document COIT Mitigation Stategies Published Version.pdf
Located in Topics / / Threat Landscape / ENISA Thematic Landscapes
Report/Study Troff document Consumerization of IT: Final report on Risk Mitigation Strategies and Good Practices
This report presents security policies that can be deployed to mitigate risks that are related with the trend of Consumerization of IT (COIT) and Bring Your Own Device (BYOD). The aim of this document is to identify mitigation strategies, policies and controls for the risks identified in this area.
Located in Publications
Consumerization of IT: Risk Assessment and Risk Mitigation Strategies and Good Practices
ENISA has produced a risk and opportunity assessment and risk mitigation strategies in the area of Consumerization of IT (COIT) and Bring Your Own Device (BYOD). The aim of this work is to assess the risks and identify mitigation strategies, policies and controls for the assessed risks. At the same time, mitigation has been proposed in a way that leaves the windows for the realization of the assessed opportunities open.
Located in Topics / / Threat Landscape / ENISA Thematic Landscapes
Report/Study ECMAScript program Consumerization of IT: Top Risks and Opportunities
This report is an ENISA deliverable in the area of “Identifying & Responding to the Evolving Threat Environment”. It delivers the results of a risk and opportunity assessment in the area of “Consumerization of IT” (COIT), that is, the recent trend where user-owned consumer oriented hard- and software spreads in business environments. COIT is considered as a term embracing the recent trend known as Bring-Your-Own-Device (BYOD).
Located in Publications
File Contributions from members of the Working Group on Economics of Security
This report contains all contributions from the members of the Working Group on Economics of Security. The contributions formed the basis for the assessment documented in the ENISA delilverable "Economics of Security: Facing the Challenges". The contributions of the working group though are of particular value because they analyse in-depth the topics that have been presented in the aforementioned concise report. Therefore they are presented in this document in their original form, that is, they have not undergone any editorial changes from the ENISA team. Apart from detailed information on each topic, the contributions contain detailed bibliographic references to relevant work.
Located in Topics / / Risk Management / Files

We use cookies on our website to support technical features that enhance your user experience.
We also use analytics. To opt-out from analytics, click for more information.

I've read it More information